IBM Security Redbooks

 

Detect, prioritize, address,
and help prevent security breaches

 
test

April 14, 2022

IBM Power Systems Cloud Security Guide: Protect IT Infrastructure In All Layers

This IBM® Redpaper publication provides a security and compliance solution that is optimized for on-premises and cloud-virtualized environments on IBM Power Systems servers, running IBM AIX®, IBM i …

Read now
test

December 21, 2021

Multi-Factor Authentication Using IBM Security Verfiy for IBM Spectrum Fusion

Data is the new crown jewel of any organization. The use of Multi-Factor Authentication (MFA) to safeguard the most critical asset of any organization (the data) became a high-priority need. MFA …

Read now
test

September 13, 2021

Securing Data on Threat Detection by Using IBM Spectrum Scale and IBM QRadar: An Enhanced Cyber Resiliency Solution

Having appropriate storage for hosting business-critical data and advanced Security Information and Event Management (SIEM) software for deep inspection, detection, and prioritization of threats has …

Read now


IBM Power Systems Cloud Security Guide: Protect IT Infrastructure In All Layers

April 14, 2022, Redpaper

This IBM® Redpaper publication provides a security and compliance solution that is optimized for on-premises and cloud-virtualized environments on IBM Power Systems servers, running IBM AIX®, IBM i and Linux. Security control and compliance are some of the key components that are needed to defend the virtualized data center and cloud infrastructure against ever evolving threats. The IBM ...


Multi-Factor Authentication Using IBM Security Verfiy for IBM Spectrum Fusion

December 21, 2021, Redpaper

Data is the new crown jewel of any organization. The use of Multi-Factor Authentication (MFA) to safeguard the most critical asset of any organization (the data) became a high-priority need. MFA verifies the identity of the consumers by applying multiple methods that provide an extra layer of security in addition to the login credentials. Regulatory compliances exist that require MFA, such as ...


Securing Data on Threat Detection by Using IBM Spectrum Scale and IBM QRadar: An Enhanced Cyber Resiliency Solution

September 13, 2021, Redpaper

Having appropriate storage for hosting business-critical data and advanced Security Information and Event Management (SIEM) software for deep inspection, detection, and prioritization of threats has become a necessity for any business. This IBM® Redpaper publication explains how the storage features of IBM Spectrum® Scale, when combined with the log analysis, deep inspection, and detection of ...


IBM Security Guardium Key Lifecycle Manager

August 02, 2021, Redbooks

This IBM® Redbooks® publication describes the installation, integration, and configuration of IBM Security Guardium® Key Lifecycle Manager.


Enabling IBM Cloud Pak for Multicloud Management to Connect Kubernetes Clusters Using IBM Secure Gateway

November 20, 2020, Redpaper

In today’s dynamically changing IT landscape, it is highly likely that a company’s cloud strategy spans multiple cloud providers. Such a span is known as the hydrid multi-cloud landscape. The challenges that quickly surface in an IT department’s list of responsibilities now encompass managing environments that are running on multiple cloud providers. The traditional IT administrators find ...


Maximizing Security with LinuxONE

August 10, 2020, Redpaper

LinuxONE® is a hardware system that is designed to support and use the Linux operating system based on the value of its unique underlying architecture. LinuxONE can be used within a private and multi-cloud environment to support a range of workloads and service various needs. On LinuxONE, security is built into the hardware and software. This IBM® Redpaper® publication gives a broad ...


Experiences Installing Firepower Services on an ASA5525X Technical Enablement Series

October 07, 2019, Redpaper

This IBM Redpaper describes a case study that involves software and hardware from Cisco Systems, Inc. Specifically, a Cisco FirePOWER module — also known as a SourceFire (SFR) module — was installed on a Cisco Adaptive Security Appliance (ASA). The case study reveals the steps, issues, and decision points of such an installation. The scope of this case study is as follows: FirePOWER 6.2.0 on ...


Security in Development: The IBM Secure Engineering Framework

December 17, 2018, Redpaper

IBM® has long been recognized as a leading provider of hardware, software, and services that are of the highest quality, reliability, function, and integrity. IBM products and services are used around the world by people and organizations with mission-critical demands for high performance, high stress tolerance, high availability, and high security. As a testament to this long-standing attention ...


IBM Spectrum Scale Security

September 18, 2018, Redpaper

Storage systems must provide reliable and convenient data access to all authorized users while simultaneously preventing threats coming from outside or even inside the enterprise. Security threats come in many forms, from unauthorized access to data, data tampering, denial of service, and obtaining privileged access to systems. According to the Storage Network Industry Association (SNIA), data ...


Managing Digital Certificates across the Enterprise

August 24, 2018, Redbooks

This IBM® Redbooks® publication is the first in a series of five books that relate to the implementation and management of digital certificates that are based on a public key infrastructure. Digital certificates play a major role in the protection of data communications and their use continues to grow. This Redbooks publication includes the following chapters: - Chapter 1, “Digital certificates ...

 
1–10 of 20 items
of 2 pages